Six Steps to Protect Customer Data

The Facebook - Cambridge Analytica scandal is simply the natural outcome of today's data-driven economy that puts businesses and others first, not users. Mark Zuckerberg's apology is a first step, but it's not enough. 

The seriousness of the revelations calls for more than mere apologies.

Change is Needed

Society needs higher standards for transparency and ethics when it comes to the handling of our information. Anyone who collects data must be accountable to their users and to society.

As we have seen recently, data abuse and mishandling can have grave consequences for both individuals and society.

The Internet Society is deeply committed to an Internet that is trusted by its users. In a connected world, everyone is affected by everybody else's actions. Incidents like this contribute to an overall climate of declining trust in the Internet and threaten its economic value.

We recommend that those who collect, use or share our data:

  1. Make sure policies about data handling reflect our interests first. As their users, we should be their first priority
  2. They must restrict and monitor any access or use of our personal data. Don't collect our data if you can't manage it.
  3. Be transparent about how they share our personal data, with whom and why.
  4. Set clear rules for handling and sharing our personal data and show us how those rules are being enforced.
  5. If our data is going to be collected, make it easy for us to control what will be collected, how it will be used, and who it will be shared with.
  6. Ask us to opt-in. Don't require us to opt-out.

If we are to continue to benefit from the value the Internet can bring, we must trust our services and platforms. Businesses must do better.

Information- Management

You Might Also Read: 

Is Your Data Being Sold On The Dark Web?:

Data Protection Officer's Guide To The GDPR Galaxy:

 

« GDPR Countdown
Fixing Hacks Has A Deadly Impact On Hospitals »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Cypress Semiconductor

Cypress Semiconductor

Cypress is a semiconductor design and manufacturing company providing embedded devices for secure IoT applications.

Zimperium

Zimperium

Zimperium offers enterprise class protection for mobile devices against the next generation of advanced mobile attacks.

e-Governance Academy (eGA)

e-Governance Academy (eGA)

eGA is a think tank and consultancy founded for the transfer of knowledge and best practice in e-governance, e-democracy and national cyber security.

PETRAS IoT Hub

PETRAS IoT Hub

PETRAS is a consortium of 12 research institutions and the world’s largest socio-technical research centre focused on the future implementation of the IoT.

Guardsquare

Guardsquare

GuardSquare is the global reference in mobile application protection. We develop premium software for the protection of mobile applications against reverse engineering and hacking.

Secudos

Secudos

SECUDOS is an innovative appliance technology and services provider focused on IT security and compliance.

Center for Applied Cybersecurity Research (CACR) - University of Indiana

Center for Applied Cybersecurity Research (CACR) - University of Indiana

CACR serves Indiana and the nation by tackling cyber risk in research and other unusual environments through agile, holistic, principle-based cybersecurity.

Fischer Identity

Fischer Identity

Fischer Identity provide identity & access management and identity governance administration solutions.

Drootoo

Drootoo

Drootoo is transforming businesses and making them high performing entities with its unified cloud platform.

Smart Protection

Smart Protection

Smart Protection are experts in brand and trademark protection - we fight against counterfeits and unauthorized usages of brands with machine learning technology.

ISMAC

ISMAC

ISMAC was founded to create a security solution that would work for smaller to medium as well as bigger corporations at an affordable price.

BullWall

BullWall

BullWall is a digital innovator dedicated to fight cybercrime in its many forms. Our overarching purpose is to stop new and unknown strings of ransomware attacks in its tracks.

Enginsight

Enginsight

Enginsight provides a comprehensive solution for monitoring and securing your servers and clients.

Ofcom

Ofcom

Ofcom is the UK's communications regulator. We regulate the TV, radio and video on demand sectors, fixed line telecoms, mobiles, postal services, plus the airwaves over which wireless devices operate.

Scribe Security

Scribe Security

Scribe security provides end-to-end software supply chain security solutions.

e-Safer

e-Safer

e-Safer's mission is to provide solutions and services that ensure a safer digital environment.